Skip to main content

A Survey: Security Issues and Challenges in Internet of Things

  • Conference paper
  • First Online:
Advances in Distributed Computing and Machine Learning

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 127))

Abstract

Internet of Things (IoT) is an emerging technology, in which sensible objects are connected to form a network and are in constant touch with one another. Today’s IoT applications are developed using different architecture approaches like centralized, distributed, and cooperative approaches. In the IoT applications, security is a main concern which needs to be studied thoroughly and deduce feasible solutions. This paper presents a brief survey of existing security challenges at different layers of IoT protocols and the initial simulation results of the work.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Yaqoob I, Ahmed E, Hashem IAT, Ahmed AIA, Gani A, Imran M, Guizani Mohsen (2017) Internet of things architecture: recent advances, taxonomy, requirements, and open challenges. IEEE Wirel Commun 24(3):10–16

    Google Scholar 

  2. Hossain M, Riazul Islam SM, Ali F, Kwak K-S, Hasan R (2018) An internet of things-based health prescription assistant and its security system design. Future Gener Comput Syst 82:422–439

    Article  Google Scholar 

  3. Chasaki D, Mansour C (2015) Security challenges in the internet of things. Int J Space Situated Compu 5(3):141–149

    Article  Google Scholar 

  4. Farooq Muhammad MU, Anjum W, Sadia Mazhar K (2015) A critical analysis on the security concerns of internet of things (IoT). Int J Comput Appl (0975 8887) 111(7)

    Google Scholar 

  5. Riahi A, Natalizio E, Challal Y, Mitton N, Iera A (2014) A systemic and cognitive approach for IoT security. In: 2014 International conference on computing, networking and communications (ICNC), pp 183–188. IEEE

    Google Scholar 

  6. Roman R, Zhou J, Lopez J (2013) On the features and challenges of security and privacy in distributed internet of things. Comput Netw 57(10):2266–2279

    Article  Google Scholar 

  7. Makkad A (2017) A survey on application layer protocols for internet of things (IoT). Int J Adv Res Comput Sci 8(3)

    Google Scholar 

  8. Abdul Rahman R, Shah B (2016) Security analysis of IoT protocols: a focus in coap. In: 2016 3rd MEC international conference on big data and smart city (ICBDSC), pp 1–7. IEEE

    Google Scholar 

  9. Makkad A (2017) Security in application layer protocols for IoT: a focus on coap. Int J Adv Res Comput Sci 8(5)

    Google Scholar 

  10. Zhao M, Kumar A, Ristaniemi T, Chong PHJ (2017) Machine-to-machine communication and research challenges: a survey. Wirel Pers Commun 97(3):3569–3585

    Article  Google Scholar 

  11. Granjal J, Monteiro E, Silva J (2015) Security for the internet of things: a survey of existing protocols and open research issues. IEEE Commun Surv Tutor 17(3):1294–1312

    Article  Google Scholar 

  12. Iova O, Picco P, Istomin T, Kiraly C (2016) Rpl: the routing standard for the internet of things... or is it? IEEE Commun Mag 54(12):16–22

    Google Scholar 

  13. Zhao M, Kumar A, Chong PHJ, Rongxing L (2017) A comprehensive study of rpl and p2p-rpl routing protocols: implementation, challenges and opportunities. Peer-to-Peer Netw Appl 10(5):1232–1256

    Article  Google Scholar 

  14. Zhao M, Kumar A, Chong PHJ, Rongxing L (2016) A reliable and energy-efficient opportunistic routing protocol for dense lossy networks. IEEE Wirel Commun Lett 6(1):26–29

    Google Scholar 

  15. Kumar A, Yu Shwe H, Juan Wong K, Chong PH (2017) Location-based routing protocols for wireless sensor networks: a survey. Wirel Sensor Netw 9(1):25–72

    Article  Google Scholar 

  16. Zhang M, Md Nawaz Ali GG, Joo Chong PH, Seet B-C, Kumar A (2019) A novel hybrid mac protocol for basic safety message broadcasting in vehicular networks. IEEE Trans Intell Transp Syst

    Google Scholar 

  17. Tara S, Raj J (2015) Networking protocols and standards for internet of things. Internet Things Data Anal Handb 7

    Google Scholar 

  18. Al-Fuqaha A, Guizani M, Mohammadi M, Aledhari M, Ayyash M (2015) Internet of things: a survey on enabling technologies, protocols, and applications. IEEE Commun Surv Tutor 17(4):2347–2376

    Article  Google Scholar 

  19. Kumar A, Zhao M, Wong K-J, Liang Guan Y, Joo Chong PH (2018) A comprehensive study of IoT and wsn mac protocols: research issues, challenges and opportunities. IEEE Access 6:76228–76262

    Article  Google Scholar 

  20. Miorandi D, Sicari S, De Pellegrini F, Chlamtac I (2012) Internet of things: vision, applications and research challenges. Ad hoc Netw 10(7):1497–1516

    Article  Google Scholar 

  21. Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 54(15):2787–2805

    Article  Google Scholar 

  22. Burhan M, Rehman R, Khan B, Kim B-S (2018) Iot elements, layered architectures and security issues: a comprehensive survey. Sensors 18(9):2796

    Article  Google Scholar 

  23. Kang N, Kim J (2018) Entity authentication and secure registration for lightweight devices in internet of things. Int J Control Autom 11(5):37–48

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Arun Kumar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yedle, B., Shrivastava, G., Kumar, A., Mishra, A.K., Mishra, T.K. (2021). A Survey: Security Issues and Challenges in Internet of Things. In: Tripathy, A., Sarkar, M., Sahoo, J., Li, KC., Chinara, S. (eds) Advances in Distributed Computing and Machine Learning. Lecture Notes in Networks and Systems, vol 127. Springer, Singapore. https://doi.org/10.1007/978-981-15-4218-3_8

Download citation

Publish with us

Policies and ethics